The Wayback Machine - https://web.archive.org/web/20220706140513/https://github.com/h33tlit
Skip to content
Avatar
🇧🇩
🇧🇩
Block or Report

Block or report h33tlit

Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
h33tlit/README.md

Hi 👋, I'm Jubaer

A passionate infosec guy from bangladesh trying to achieve the impossible.

h33tlit

  • 🔭 I’m currently working as a Cyber Security Engineer (Pentester) in Singapore

  • 👯 I’m looking to collaborate on Security Projects Involving Automation And Monitoring

  • 👨‍💻 My old writeups can be found at - jubaeralnazi.com

Connect with me:

alnazi-h33t

Languages and Tools:

aws docker flask git javascript linux mongodb php python

Pinned

  1. Jbin will gather all the URLs from the website and then it will try to expose the secret data from them such as API keys, API secrets, API tokens and many other juicy information.

    JavaScript 69 11

  2. Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection vulnerabilities.

    Python 4 4

  3. Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.

    7

  4. List of regex for scraping secret API keys and juicy information.

    192 18

543 contributions in the last year

Jul Aug Sep Oct Nov Dec Jan Feb Mar Apr May Jun Mon Wed Fri

Contribution activity